Comments on: Mandatory MFA Requirement for Access to Azure Sites and Tools https://office365itpros.com/2024/08/19/azure-mfa-requirement/?utm_source=rss&utm_medium=rss&utm_campaign=azure-mfa-requirement Mastering Office 365 and Microsoft 365 Tue, 10 Sep 2024 07:59:49 +0000 hourly 1 By: Cyril https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12832 Tue, 10 Sep 2024 07:59:49 +0000 https://office365itpros.com/?p=66039#comment-12832 In reply to Tony Redmond.

Although I understand Microsoft’s point of view and strongly agree with them, the Microsoft-Managed Conditional Access Rules could have done the job. Break-glass accounts are sensitive and their whole purpose is to bypass anything including MFA. This adds a level of risk to these accounts (lost or broken fido2 key, …). Also, can’t seem to understand why Microsoft creates such “standard” things as CA rules, to replace Per-User MFA, they’re adaptive, “universal” in a way that allows Microsoft to push rules to tenant… just to create another specific thing in a dark corner of the room that does the same job but goes over it.

]]>
By: cleverf643c91e33 https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12823 Sun, 08 Sep 2024 20:33:24 +0000 https://office365itpros.com/?p=66039#comment-12823 In reply to Tony Redmond.

thanks so much!

]]>
By: Tony Redmond https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12800 Wed, 04 Sep 2024 11:39:26 +0000 https://office365itpros.com/?p=66039#comment-12800 In reply to Thom Phillips.

Microsoft supports MFA resources from non-Entra sources. You’ll have to work the details out with Okta, who are well aware of the situation.

]]>
By: Thom Phillips https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12798 Wed, 04 Sep 2024 03:01:29 +0000 https://office365itpros.com/?p=66039#comment-12798 What is accounts are behind Okta?

]]>
By: Mandatory MFA Requirement for Access to Azure Sites and Tools – blog by Tony Redmond https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12788 Mon, 02 Sep 2024 07:51:19 +0000 https://office365itpros.com/?p=66039#comment-12788 […] Link:Mandatory Azure MFA Requirement Starts on October 15 2024 (office365itpros.com) […]

]]>
By: Tony Redmond https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12761 Tue, 27 Aug 2024 08:59:56 +0000 https://office365itpros.com/?p=66039#comment-12761 In reply to Justin Fuller.

Any account that does not satisfy an MFA challenge will be unable to connect to the Azure sites/administrartive tools after the requirement is imposed, so yes – if those accounts need to use the Entra admin center, Azure admin center, Intune admin center, Azure CLI, and Azure PowerShell.

]]>
By: Justin Fuller https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12760 Tue, 27 Aug 2024 07:24:33 +0000 https://office365itpros.com/?p=66039#comment-12760 Hi Tony
We have a Conditional access policy set up to excluded account from MFA for mailboxes and automation accounts etc. Would the accounts in the policy stop working after the October date?
Thanks

]]>
By: Tony Redmond https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12727 Thu, 22 Aug 2024 11:22:50 +0000 https://office365itpros.com/?p=66039#comment-12727 In reply to Tomás P.

As I have no visibility into the tools you’re using (versions, configurations, etc.) or what you’re trying to do in your tenant, I suggest that you file a support incident with Microsoft and have their support engineers check things out. That way if an issue is discovered, it will be formally noted by Microsoft and sent to the relevant engineering team.

]]>
By: Tomás P https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12726 Thu, 22 Aug 2024 11:06:17 +0000 https://office365itpros.com/?p=66039#comment-12726 In reply to Tomás P.

Until now if MFA is enforced for this account then Azure AD Connect starts raising errors.

]]>
By: Tomás P https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12723 Thu, 22 Aug 2024 10:56:10 +0000 https://office365itpros.com/?p=66039#comment-12723 Thanks Tony

Do you know if this affects to the account used by Azure Ad Connect to synchronize on premise AD with Entra?

Thanks again for your great work.

]]>
By: Heath S https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12713 Wed, 21 Aug 2024 07:11:52 +0000 https://office365itpros.com/?p=66039#comment-12713 For the Microsoft-managed policy … “When you are ready to enable, switch its state to ‘on’. If you do not want to enforce this policy for your organization, switch its state to ‘off’. If you leave the policy in report-only mode, we will enable it for you.”

So if you set it to OFF now then MS will not auto-enable it in your org.

]]>
By: Paul Cooper https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12704 Mon, 19 Aug 2024 10:41:01 +0000 https://office365itpros.com/?p=66039#comment-12704 Thanks Tony

]]>
By: Tony Redmond https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12703 Mon, 19 Aug 2024 08:40:36 +0000 https://office365itpros.com/?p=66039#comment-12703 In reply to Paul Cooper.

It does. You can continue to have a break glass account that is excluded from MFA and doesn’t use MFA, but if a problem happens that account will not be able to satisfy the requirement to undergo an MFA challenge to access Azure administrative tools. For instance, the account could access the Microsoft 365 admin center but not the Entra admin center. To make sure that the break glass account can access everything, it must be able to satisfy MFA. The recommended approach is to use a strong authentication method like a FIDO2 key.

]]>
By: Paul Cooper https://office365itpros.com/2024/08/19/azure-mfa-requirement/#comment-12702 Mon, 19 Aug 2024 08:04:06 +0000 https://office365itpros.com/?p=66039#comment-12702 So this overturns the previous advice of having a breakglass account exluded from all conditional access policies including MFA, which has a very long password printed out and kept in a safe (possibly half in one safe and the other half in another)

]]>